946 resultados para Mutual security program, 1951-
Resumo:
A one-time program is a hypothetical device by which a user may evaluate a circuit on exactly one input of his choice, before the device self-destructs. One-time programs cannot be achieved by software alone, as any software can be copied and re-run. However, it is known that every circuit can be compiled into a one-time program using a very basic hypothetical hardware device called a one-time memory. At first glance it may seem that quantum information, which cannot be copied, might also allow for one-time programs. But it is not hard to see that this intuition is false: one-time programs for classical or quantum circuits based solely on quantum information do not exist, even with computational assumptions. This observation raises the question, "what assumptions are required to achieve one-time programs for quantum circuits?" Our main result is that any quantum circuit can be compiled into a one-time program assuming only the same basic one-time memory devices used for classical circuits. Moreover, these quantum one-time programs achieve statistical universal composability (UC-security) against any malicious user. Our construction employs methods for computation on authenticated quantum data, and we present a new quantum authentication scheme called the trap scheme for this purpose. As a corollary, we establish UC-security of a recent protocol for delegated quantum computation.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
PURPOSE We wanted to assess the effectiveness of a home-based physical activity program, the Depression in Late Life Intervention Trial of Exercise (DeLLITE), in improving function, quality of life, and mood in older people with depressive symptoms. METHODS We undertook a randomized controlled trial involving 193 people aged 75 years and older with depressive symptoms at enrollment who were recruited from primary health care practices in Auckland, New Zealand. Participants received either an individualized physical activity program or social visits to control for the contact time of the activity intervention delivered over 6 months. Primary outcome measures were function, a short physical performance battery comprising balance and mobility, and the Nottingham Extended Activities of Daily Living scale. Secondary outcome measures were quality of life, the Medical Outcomes Study 36-item short form, mood, Geriatric Depression Scale (GDS-15), physical activity, Auckland Heart Study Physical Activity Questionnaire, and self-report of falls. Repeated measures analyses tested the differential impact on outcomes over 12 months’ follow-up. RESULTS The mean age of the participants was 81 years, and 59% were women. All participants scored in the at–risk category on the depression screen, 53% had a Diagnostic and Statistical Manual of Mental Disorders or International Classification of Diseases, Tenth Revision diagnosis of major depression or scored more than 4 on the GDS-15 at baseline, indicating moderate or severe depression. Almost all participants, 187 (97%), completed the trial. Overall there were no differences in the impact of the 2 interventions on outcomes. Mood and mental health related quality of life improved for both groups. CONCLUSION he DeLLITE activity program improved mood and quality of life for older people with depressive symptoms as much as the effect of social visits. Future social and activity interventions should be tested against a true usual care control.
Resumo:
Background: Little is known about the health effects of worksite wellness programs on police department staff. Objective: To examine 1-2 year changes in health profiles of participants in the Queensland Police Service’s wellness program. Methods: Participants underwent yearly physical assessments. Health profile data collected during assessments from 2008 to 2012 were included in the analysis. Data Analysis: Repeated-measures ANOVA was used for continuous outcome variables, related-samples Wilcoxon Signed Rank test for non-normally continuous variables, and McNemar’s test for binary variables. Results: Significant changes in physical measures included decreases in waist circumference and percent body fat, and increases in cardiorespiratory fitness and flexibility (p<0.01). Changes in serum cholesterol, haemoglobin, total cholesterol ratios, HDL, LDL and Triglyceride levels were also significant (p<0.01). Conclusion: Participants’ health profiles mostly improved between cycles although most changes were not clinically significant. As this evaluation used a single-group pre-test post-test design, it provides initial indications that wellness programs can benefit staff in police departments.
Resumo:
Background: Women with young children (under 5 years) are a key population group for physical activity intervention. Previous evidence highlights the need for individually tailored programs with flexible delivery mechanisms for this group. Our previous pilot study suggested that an intervention primarily delivered via mobile phone text messaging (MobileMums) increased self-reported physical activity in women with young children. An improved version of the MobileMums program is being compared with a minimal contact control group in a large randomised controlled trial (RCT). Methods/design: This RCT will evaluate the efficacy, feasibility and acceptability, cost-effectiveness, mediators and moderators of the MobileMums program. Primary (moderate-vigorous physical activity) and secondary (intervention implementation data, health service use costs, intervention costs, health benefits, theoretical constructs) outcomes are assessed at baseline, 3-months (end of intervention) and 9-months (following 6-month no contact: maintenance period). The trial is registered with the Australian New Zealand Clinical Trials Registry (ACTRN12611000481976; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=336109).The intervention commences with a face-to-face session with a behavioural counsellor to initiate rapport and gather information for tailoring the 12-week text message program. During the program participants also have access to a: MobileMums Participant Handbook, MobileMums refrigerator magnet, MobileMums Facebook(C) group, and a MobileMums website with a searchable, on-line exercise directory. A nominated support person also receives text messages for 12-weeks encouraging them to offer their MobileMum social support for physical activity. Discussion: Results of this trial will determine the efficacy and cost-effectiveness of the MobileMums program, and the feasibility of delivering it in a community setting. It will inform the broader literature of physical activity interventions for women with young children and determine whether further investment in the translation of the program is warranted.
Resumo:
The current program of research addresses the need for multi-level programs to target the major increase in injury rates that occurs throughout adolescence. Specifically, it involves the investigation of school connectedness as a protective factor for adolescent injury, and the development of school connectedness as a component of an injury prevention program. To date, school-based risk taking and injury prevention has frequently been limited to addressing adolescents' knowledge and attitudes to risk behaviours, and has largely overlooked the importance of the wider school social context as a protective factor in adolescent development. Additionally, school connectedness has been primarily studied in terms of its impact on student achievement, wellbeing and risk taking behaviour, and research has not yet addressed possible links with injury. Further, school connectedness intervention programs have targeted risk taking behaviours without evaluating their potential impact on injury outcomes. This is the first reported research to develop strategies to increase school connectedness as part of a school-based injury prevention program. The research program was conceptualised as three distinct stages. The development of these research stages was informed by a comprehensive review of the literature on adolescent risk taking, injury and school-based prevention, as well as on school connectedness and its importance in adolescence. A review of the school connectedness literature indicated that students' connectedness is largely influenced by relationships within the school context including with teachers and other school staff, and is therefore a potentially modifiable factor that may be targeted in school-based programs. Overall, the literature shows school connectedness to be a key protective factor in adolescent development. This review established a foundation from which the current program of research was designed. The first stage of the research involved an empirical investigation of the relationship between adolescent risk taking-related injuries and school connectedness. Stage one incorporated two studies. The first involved the development of a measure of adolescent injury, the Extended Adolescent Injury Checklist (E-AIC), for use in the current research as well as in future school-based studies and program evaluation. The results of this study also highlighted the extent of the problem of risk-related injury in adolescence. The second study in Stage one examined the relationship between students' reports of school connectedness, risk taking behaviour and risk taking-related injuries on the E-AIC. The results of this study showed significant relationships between increased school connectedness and reduced reported engagement in transport and violence risk taking, and fewer associated injuries. This study therefore suggested the potential for school-based injury prevention programs to incorporate strategies targeting increased adolescent connectedness to school. The second stage of this research involved the compilation of an evidence base to inform the design of a school connectedness intervention. Stage two also incorporated two studies. The first study in Stage two involved a systematic review of programs that have targeted school connectedness for reduced risk taking and injury. The results of this study revealed that interventions targeting school connectedness can be effective in reducing adolescent risk taking behaviour, and also provided an evidence base for the design of the current school connectedness intervention. The second study in Stage two examined teachers' understanding and perceptions of school connectedness. This qualitative study indicated that teachers consider students' connectedness to be an important factor that relates to their risk taking behaviour; and also provided directions and content for the intervention design stage. The third stage of this research built upon the findings of each of the previous studies, and involved the design, implementation and evaluation of a school connectedness intervention as a component of an adolescent injury prevention program, Skills for Preventing Injury in Youth (SPIY). This connectedness intervention was designed as a professional development workshop for teachers of 13 to 14 year old adolescents, and was developed as a complementary component to the curriculum-based SPIY program. The SPIY connectedness component was implemented and evaluated using process and six-month impact evaluation methodologies. The results of this study revealed that teachers saw value in the program and made use of the strategies presented, and that program school students' self-reported violence risk behaviour was reduced at six-month follow-up. Despite these promising findings, the results of this study did not demonstrate a significant impact of the program on change in students' connectedness to school, relative to comparison schools. The positive impact on self-reported violence risk behaviour was however replicated in additional analyses comparing students participating in the connectedness version of SPIY with students participating in an earlier curriculumonly version of the program. This finding indicated that the connectedness component has additional benefits relating to reduction in violence risks, over and above a curriculum-only version of the program. This research was the first reported to address the relationship between school connectedness and adolescent injury outcomes, and to develop school connectedness as a component of an adolescent injury prevention program. Overall, the results of this program of research have demonstrated the importance of incorporating strategies targeting the wider school social context, including school connectedness, in adolescent injury prevention programs. This research has important implications for future research and practice in adolescent injury prevention.
Resumo:
Background and significance: Nurses' job dissatisfaction is associated with negative nursing and patient outcomes. One of the most powerful reasons for nurses to stay in an organisation is satisfaction with leadership. However, nurses are frequently promoted to leadership positions without appropriate preparation for the role. Although a number of leadership programs have been described, none have been tested for effectiveness, using a randomised control trial methodology. Aims: The aims of this research were to develop an evidence based leadership program and to test its effectiveness on nurse unit managers' (NUMs') and nursing staff's (NS's) job satisfaction, and on the leader behaviour scores of nurse unit managers. Methods: First, the study used a comprehensive literature review to examine the evidence on job satisfaction, leadership and front-line manager competencies. From this evidence a summary of leadership practices was developed to construct a two component leadership model. The components of this model were then combined with the evidence distilled from previous leadership development programs to develop a Leadership Development Program (LDP). This evidence integrated the program's design, its contents, teaching strategies and learning environment. Central to the LDP were the evidence-based leadership practices associated with increasing nurses' job satisfaction. A randomised controlled trial (RCT) design was employed for this research to test the effectiveness of the LDP. A RCT is one of the most powerful tools of research and the use of this method makes this study unique, as a RCT has never been used previously to evaluate any leadership program for front-line nurse managers. Thirty-nine consenting nurse unit managers from a large tertiary hospital were randomly allocated to receive either the leadership program or only the program's written information about leadership. Demographic baseline data were collected from participants in the NUM groups and the nursing staff who reported to them. Validated questionnaires measuring job satisfaction and leader behaviours were administered at baseline, at three months after the commencement of the intervention and at six months after the commencement of the intervention, to the nurse unit managers and to the NS. Independent and paired t-tests were used to analyse continuous outcome variables and Chi Square tests were used for categorical data. Results: The study found that the nurse unit managers' overall job satisfaction score was higher at 3-months (p = 0.016) and at 6-months p = 0.027) post commencement of the intervention in the intervention group compared with the control group. Similarly, at 3-months testing, mean scores in the intervention group were higher in five of the six "positive" sub-categories of the leader behaviour scale when compared to the control group. There was a significant difference in one sub-category; effectiveness, p = 0.015. No differences were observed in leadership behaviour scores between groups by 6-months post commencement of the intervention. Over time, at three month and six month testing there were significant increases in four transformational leader behaviour scores and in one positive transactional leader behaviour scores in the intervention group. Over time at 3-month testing, there were significant increases in the three leader behaviour outcome scores, however at 6-months testing; only one of these leader behaviour outcome scores remained significantly increased. Job satisfaction scores were not significantly increased between the NS groups at three months and at six months post commencement of the intervention. However, over time within the intervention group at 6-month testing there was a significant increase in job satisfaction scores of NS. There were no significant increases in NUM leader behaviour scores in the intervention group, as rated by the nursing staff who reported to them. Over time, at 3-month testing, NS rated nurse unit managers' leader behaviour scores significantly lower in two leader behaviours and two leader behaviour outcome scores. At 6-month testing, over time, one leader behaviour score was rated significantly lower and the nontransactional leader behaviour was rated significantly higher. Discussion: The study represents the first attempt to test the effectiveness of a leadership development program (LDP) for nurse unit managers using a RCT. The program's design, contents, teaching strategies and learning environment were based on a summary of the literature. The overall improvement in role satisfaction was sustained for at least 6-months post intervention. The study's results may reflect the program's evidence-based approach to developing the LDP, which increased the nurse unit managers' confidence in their role and thereby their job satisfaction. Two other factors possibly contributed to nurse unit managers' increased job satisfaction scores. These are: the program's teaching strategies, which included the involvement of the executive nursing team of the hospital, and the fact that the LDP provided recognition of the importance of the NUM role within the hospital. Consequently, participating in the program may have led to nurse unit managers feeling valued and rewarded for their service; hence more satisfied. Leadership behaviours remaining unchanged between groups at the 6 months data collection time may relate to the LDP needing to be conducted for a longer time period. This is suggested because within the intervention group, over time, at 3 and 6 months there were significant increases in self-reported leader behaviours. The lack of significant changes in leader behaviour scores between groups may equally signify that leader behaviours require different interventions to achieve change. Nursing staff results suggest that the LDP's design needs to consider involving NS in the program's aims and progress from the outset. It is also possible that by including regular feedback from NS to the nurse unit managers during the LDP that NS's job satisfaction and their perception of nurse unit managers' leader behaviours may alter. Conclusion/Implications: This study highlights the value of providing an evidence-based leadership program to nurse unit managers to increase their job satisfaction. The evidence based leadership program increased job satisfaction but its effect on leadership behaviour was only seen over time. Further research is required to test interventions which attempt to change leader behaviours. Also further research on NS' job satisfaction is required to test the indirect effects of LDP on NS whose nurse unit managers participate in LDPs.
Resumo:
Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.
Resumo:
Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.